Home / CSE MCQs / DBMS MCQs :: Constraints - DBMS

CSE MCQs :: DBMS MCQs

  1. Data integrity constraints are used to
  2. A.
    Control who is allowed access to the data
    B.
    Ensure that duplicate records are not entered into the table
    C.
    Improve the quality of data entered for a specific property
    D.
    Prevent users from changing the values stored in the table

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Establishing limits on allowable property values, and specifying a set of acceptable, predefined options that can be assigned to a property are examples of:
  4. A.
    Attributes
    B.
    Data integrity constraints
    C.
    Method constraints
    D.
    Referential integrity constraints

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Which of the following can be addressed by enforcing a referential integrity constraint?
  6. A.
    All phone numbers must include the area code
    B.
    Certain fields are required (such as the email address, or phone number) before the record is accepted
    C.
    Information on the customer must be known before anything can be sold to that customer
    D.
    Then entering an order quantity, the user must input a number and not some text (i.e., 12 rather than 'a dozen')

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. ______ is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
  8. A.
    Entity Integrity Constraints
    B.
    Referential Integrity Constraints
    C.
    Domain Integrity Constraints
    D.
    Domain Constraints

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Which one of the following uniquely identifies the elements in the relation?
  10. A.

    Secondary Key

    B.
    Primary key
    C.
    Foreign key
    D.
    Composite key

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Drop Table cannot be used to drop a table referenced by a _________ constraint.
  12. A.
    Local Key
    B.
    Primary Key
    C.
    Composite Key
    D.
    Foreign Key

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. ____________ is preferred method for enforcing data integrity
  14. A.
    Constraints
    B.
    Stored Procedure
    C.
    Triggers
    D.
    Cursors

    View Answer

    Workspace

    Discuss Discuss in Forum